Jump to ratings and reviews
Rate this book

Intelligence and Security Informatics: First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings

Rate this book
Full Papers.- Using Support Vector Machines for Terrorism Information Extraction.- Criminal Incident Data Association Using the OLAP Technology.- A New Frontier in Text Mining.- Web-Based Intelligence Reports System.- Authorship Analysis in Cybercrime Investigation.- Behavior Profiling of Email.- Detecting Deception through Linguistic Analysis.- A Longitudinal Analysis of Language Behavior of Deception in E-mail.- Evacuation A Capacity Constrained Routing Approach.- Locating Hidden Groups in Communication Networks Using Hidden Markov Models.- Automatic Construction of Cross-Lingual Networks of Concepts from the Hong Kong SAR Police Department.- Decision Based Spatial Analysis of Crime.- CrimeLink Using Domain Knowledge to Facilitate Automated Crime Association Analysis.- A Spatio Temporal Visualizer for Law Enforcement.- Tracking Hidden Groups Using Communications.- Examining Technology Acceptance by Individual Law Enforcement An Exploratory Study.- "Atrium" - A Knowledge Model for Modern Security Forces in the Information and Terrorism Age.- Untangling Criminal A Case Study.- Addressing the Homeland Security A Collaborative Decision-Making Framework.- Collaborative Workflow Management for Interagency Crime Analysis.- COPLINK An Architecture for Information Monitoring and Sharing in Law Enforcement.- Active Database Systems for Monitoring and Surveillance.- Integrated "Mixed" Networks Security Monitoring - A Proposed Framework.- Bioterrorism Surveillance with Real-Time Data Warehousing.- Short Papers.- Privacy Sensitive Distributed Data Mining from Multi-party Data.- Biographical Descriptions for Intelligence Analysis.- Scalable Knowledge Extraction from Legacy Sources with SEEK.- "TalkPrinting": Improving Speaker Recognition by Modeling Stylistic Features.- Emergent Semantics from Users' Browsing Paths.- Designing Agent99 A Learner-Centered, Web-Based Training System for Deception Detection.- Training Professionals to Detect Deception.- An E-mail Monitoring System for Detecting Outflow of Confidential Documents.- Intelligence and Security An Information Economics Perspective.- An International Perspective on Fighting Cybercrime.- Extended Abstracts for Posters.- Hiding Traversal of Tree Structured Data from Untrusted Data Stores.- Criminal Record Matching Based on the Vector Space Model.- Database Support for Exploring Criminal Networks.- Hiding Data and Code Security for Application Hosting Infrastructure.- Secure Information Sharing and Information Retrieval Infrastructure with GridIR.- Semantic Hacking and Intelligence and Security Informatics.

404 pages, Paperback

First published August 5, 2003

1 person is currently reading
1 person want to read

About the author

Hsinchun Chen

72 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
1 (100%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.